Stories
Slash Boxes
Comments

SoylentNews is people

posted by janrinok on Tuesday July 28 2015, @08:05PM   Printer-friendly
from the make-that-rule-"NO-phones" dept.

The most sensitive work environments, like nuclear power plants, demand the strictest security. Usually this is achieved by air-gapping computers from the Internet and preventing workers from inserting USB sticks into computers. When the work is classified or involves sensitive trade secrets, companies often also institute strict rules against bringing smartphones into the workspace, as these could easily be turned into unwitting listening devices.

But researchers in Israel have devised a new method for stealing data that bypasses all of these protections—using the GSM network, electromagnetic waves and a basic low-end mobile phone. The researchers are calling the finding a "breakthrough" in extracting data from air-gapped systems and say it serves as a warning to defense companies and others that they need to immediately "change their security guidelines and prohibit employees and visitors from bringing devices capable of intercepting RF signals," says Yuval Elovici, director of the Cyber Security Research Center at Ben-Gurion University of the Negev, where the research was done.

The attack requires both the targeted computer and the mobile phone to have malware installed on them, but once this is done the attack exploits the natural capabilities of each device to exfiltrate data. Computers, for example, naturally emit electromagnetic radiation during their normal operation, and cell phones by their nature are "agile receivers" of such signals. These two factors combined create an "invitation for attackers seeking to exfiltrate data over a covert channel," the researchers write in a paper about their findings.


Original Submission

 
This discussion has been archived. No new comments can be posted.
Display Options Threshold/Breakthrough Mark All as Read Mark All as Unread
The Fine Print: The following comments are owned by whoever posted them. We are not responsible for them in any way.
  • (Score: 3, Informative) by LoRdTAW on Tuesday July 28 2015, @09:11PM

    by LoRdTAW (3755) on Tuesday July 28 2015, @09:11PM (#215059) Journal

    If you already have malware on the target computer, why do you need the cell phone?

    This isn't about a one-way attack like stuxnet where the objective was to damage a system without receiving anything (more akin to a heat seeking missile). This is a quasi two way attack wherein the malware transmitted by a USB stick will allow the infected system to emit data like a beacon. The air-gapped part is the challenge. If you want to get data out of the system, you need a receiver. In this case, the cell phone is the receiver. The reason this is significant is some companies ban smartphones but may allow dumb phones. This hack demonstrates that even dumb phones can act as receivers. They also mention that a more powerful receiver (meaning one using a high gain antenna and advanced signal processing) which allows for higher bit rates and could allow the attacker to park a vehicle with said receiver outside of a building.

    Starting Score:    1  point
    Moderation   +1  
       Informative=1, Total=1
    Extra 'Informative' Modifier   0  
    Karma-Bonus Modifier   +1  

    Total Score:   3  
  • (Score: 0) by Anonymous Coward on Wednesday July 29 2015, @09:31AM

    by Anonymous Coward on Wednesday July 29 2015, @09:31AM (#215346)

    Of course, all of those attacks could be mitigated by covering the computer in a Faraday cage.

    • (Score: 2) by LoRdTAW on Wednesday July 29 2015, @12:18PM

      by LoRdTAW (3755) on Wednesday July 29 2015, @12:18PM (#215391) Journal

      True. But how many sensitive systems are CURRENTLY in a faraday cage?

      • (Score: 2) by maxwell demon on Wednesday July 29 2015, @07:07PM

        by maxwell demon (1608) on Wednesday July 29 2015, @07:07PM (#215580) Journal

        I'm pretty sure I've heard about the possibility of turning internal computer wires into sending antennas by software years ago. Therefore I'd expect anything really security critical to be in Faraday cages, provided whoever is responsible for security is worth the money he earns.

        --
        The Tao of math: The numbers you can count are not the real numbers.